Glossary of how basic terms are used in this book introduction


C6. TRACKING & I.D. IMPLANTS



Download 4.84 Kb.
View original pdf
Page151/276
Date07.11.2018
Size4.84 Kb.
1   ...   147   148   149   150   151   152   153   154   ...   276
C6. TRACKING & I.D. IMPLANTS
This type of implant has gotten most of the public’s attention. For several years now the public has been aware
Page 164 of 296
Deeper Insights into the Illuminati Formula by Fritz Springmeier & Cisco Wheeler
3/1/2007
http://www.whale.to/b/sp/springmeier.html

that animals, military personnel as well as civilians have been given tracking implants. Objects also have received tracking implants. DCI of the CIA Bob Gates is reported to have said, "If you can’t identify people, you can’t control them." The Wall St. Journal, 3/30/1992 reported that the FDA proposed that tracking devices onto 35 classes of medical devices such as heart valves and breast implants. The excuse was that they needed to track life-sustaining medical devices better. The list of devices to be tracked includes cardiovascular filters, defibrillators, pacemaker electrodes, heart valves, tracheal protheses, breathing monitors, portable oxygen generators, ventilators, infusion oxygen generators, ventilators, infusion pumps and various silicone gel-filled devices such as testicular implants and breast implants, and spinal implants. The Hughs Identification Device has been placed onto such objects as breast implants. These tracking implants are reported to have a life of 250 years. Their tracking I.D. number consists of #, letter, #, letter, # etc. The U.S. Navy has employed RF/ID
"waterproof bracelets" for tracking individuals underwater. The U.S. military has required its personnel to take tracking implants under the pretense of being able to find them if they get lost, and millions of men and women in the military have already gotten these tracking implants. A book published by the U.S. Army War College in
1994 (entitled The Revolution in Military Affairs and Conflict Short of War) shows the Army’s interest in tracking implants. Many tracking implants were placed into military personnel during Desert Shield/Desert
Storm operations. Some tracking implants are programmable and can record vital data about a person. They could also be used as a debit card for financial transactions, which is why they have gotten so much attention as the much feared Mark of the Beast. Texe Marr’s popular book Project L.U.C.I.D. exposed the L.U.C.I.D.
System which will be a central clearing house for keeping track of everyone. He reproduced a diagram from an issue of Narc Officer magazine showing how the system would connect an individual’s universal biometrics card with the justice, data communications, and telecommunications systems of the World Order. Texe Marrs and others are fascinated at the choice of words & acronyms that the establishment keeps picking. Dr. Creusat, a medical doctor with Interpol is the official designer of L.U.C.I.D. He and his co-designer initially refused to reveal what the acronym L.U.C.I.D. stands for. Some speculate that it stands for the obvious: "Lucifer’s I.D." system. It’s also strange that AT&T called their new company derived from Bell Labs (which has been involved in mind-control for the Illuminati) "Lucent Technologies". Again some people speculate that Lucent means
Lucifer’s Enterprises. And what did Lucent come out with? They came out with a new computer network called "Inferno" (another name for Hell), written in a language called "Limbo" (a place in Hell) with computer protocols called "Styx" (a river in Hell). And then on the other side of the Atlantic, a world-wide net called
Demon Internet is being offered to people in Europe. (To have Demon Internet installed for you by Demon
Internet, Ltd. at 322 Regents Park Rd., Finchley, London N3 2QQ costs initially £1,762.50 for the first month according to recent company literature.) Again the obvious ques tion, why are these companies using occult-- even satanic terms for their products? Illuminati member and chairman of IBM Thomas Watson, Jr. set up a cryptology research group at IBM’s research lab in Yorktown Heights in NY. This group was led by Horst
Feistel, and it developed a cipher code called "Lucifer". Lucifer was then sold to Lloyd’s of London. Lucifer was created under the auspices of the NSA. Lucifer worked off of an algorithm. The NSA had set things up via
IBM so that it has had a back door to anything encrypted with Lucifer. (By the way NSA’s partner in the U.K. is the brit’s GCHQ.) The paper trail indicates that L.U.C.I.D. intends to keep track of people by using biometrics
(iris scan, fingerprint, voiceprint, photos, and other bio identification features) that will be encoded on cards (or implants.) DNA databanks are already giving computers an enormous ability to identify millions of americans via their DNA. Texe Marrs also calls our attention in his book about L.U.C.I.D. to the important mandatory ISO
9000 program, which makes it mandatory for all products to have an ISO 9000 I.D. number and their approval and certification. Over 100 countries have adopted the ISO 9000 standards. In 1999, use of the system, which was voluntary, will become mandatory. The government is also setting up TPN (Trading Partner Numbers).
While obtaining all these numbers to do business is not directly mind-control; if a person can’t buy or sell without the approved numbers, it does tend to place a person or company under the World Order’s control. The
NACCB in England and the ASQC and the ANSI have been given power to accredit people with the ISO 9000 numbers. IOS is also in some type of overseeing role in the accreditation process. Here we go, more acronym monsters to control our lives! But while attention has been focused on this, many other implants have been implanted for mind-control. It all works together. The tracking implants certainly are an external means of controlling people that will work along side of the mind-control to lock people into their Established System.
The tracking implants have broader application than just to keep track of an individual’s location, or his financial records. Tracking implants can be used to send bio information on the heart beat, the BEG, EKG and other bio tracking methods. Researchers who are following the field of tracking implants will remember the article "An Eight Channel Micropowered PAM/FM Biomedical Telemetry System" in the NTC ’71 Record, p.
Page 165 of 296
Deeper Insights into the Illuminati Formula by Fritz Springmeier & Cisco Wheeler
3/1/2007
http://www.whale.to/b/sp/springmeier.html


309. The Air Force Office of Scientific Research, NASA financed that study which involved an 8-channel micropowered telemetry system designed to sense and transmit physiological data. The system was actually successfully used. They will also remember an earlier article in the IEEE Transactions on Bio-medical
Engineering, Vol. BME-14, Oct. 1967 entitled, "The Design and Use of an FM/AM Radiotelemetry System for
Multichannel Recording of Biological Data." And then they will remember an even earlier report from the
Biophysics Lab, of the Aerospace Medical Labs of the Aerospace Medical Div. at Wright Patterson AFB, Ohio dated 1965 entitled, "Personal telemetry transmitter system." The point is that tracking implant research has been with us for several decades, and is being utilized to control slaves who have body suits of implants. They have been publicly monitoring animals with bio-telemetry for several decades, it doesn’t take any stretch of the imagination to comprehend that they are also doing it with their slaves. While these articles were from the ’60s, soon afterwards a book appeared Mackay, R.S.
Biomedical Telemetry, Sensing and Transmitting Biological Information from Animals and Man. John Wiley &
Sons, Inc.: NY, 1970. Faceprints are a new method which uses a math algorithm that establishes distances between eye pupils, nasal base, lip center and other facial points. The algorithm produces a 50-bit number that is person-specific. The plans are to code this along with other unique I.D. features onto the magnetic strips of I.D. cards. The American CIA developed in conjunction with the Thai police a smart identity card for use in
Thailand. The Computerworld Smithsonian Award was given to the Thai Ministry of Interior for this "innovative technology" in 1990. In other words, one part of Big Brother patted another on the back. Was the
CIA protecting us, Mr. & Mrs. Citizens by doing this so-called "intelligence" work, or was it working on another agenda by developing this high tech ID card? Later the military adopted the MARC ID card based on similar ideas.
Bell Communications (in NJ) developed voice activated credit cards. Reports are that colds can throw one’s voice off so that it’s rejected by the flat microchip in the voice card. When this author calls the World Order’s mind-control "total", he means just that--it is designed to control the body, mind and spirit of a person. By taking bio information via implants, DNA codes, blood types, retina scans, hand geometry and face prints, without our real consent the World Order has effectively stolen our Fifth Amendment rights. John Adams wrote,
"Property must be secured or liberty cannot exist." (The Works of John Adams, Vol. 6:9, p. 280.) The purpose of the American government was to protect property. But they have stolen our privacy. They have put into law
(contrary to the Constitution & Bill of -Rights) several laws that will force us to provide information to computer data banks that will be used to determine if we can buy or sell, if we can get employment or not, & if we are deemed politically correct or not. And those on the wrong side of the NWO may be incarcerated and programmed. While tracking implants are not mind-control per se, they will work hand in glove with actual mind-control to make sure no one under mind-control can effectively get away. Therefore all tracking devices must be seen in the broader context as being devices to assist in the implementation of total mind-control. One genius scientist who worked on the bio-chip and who still works as a civilian for the government personally told this author that he is excused for his help on the project because technology is neutral. Technology is neither good nor bad, so he claims. I disagree, and so did another scientist who did repent of helping with this infernal project, and apologized to this author. These bio-chips are going to be used for the enslavement of mankind, and for total mind-control. There is no justification, no excuse great enough to allow people to side-step their responsibility in the creation of such technology intended for evil. We have a responsibility to know how our inventions will be used before we create them. It doesn’t take a rocket scientist to know what these inventions are going to be used for. Unfortunately, this man who assisted with the bio-chip is a rocket scientist.


Deeper insights into the illuminati formula by fritz
Chapter 4. science no. 4 - hypnosis
Chapter 5: science no. 5 - the skill of lying, the art of deceit
Chapter 6: science no. 6-the use of electronics & electricity
Chapter 11: science no. 11- internal controls
Appendix 1 - programmers/researchers
Section c. the four types of "clones" that are used by the illuminati,
Warning, read this first before reading the book.
Introduction by fritz
Glossary of how basic terms are used in this book
Chapter 1. science no. 1 - selection & preparation of the victim
Breeding good subjects for hypnosis-hypnosis as it relates to selection & preparation of the
Training the unborn child
Common illuminati work with twins
Selection of adult candidates for mind-control
U.s. govt. mind-control level 1.
U.s. govt. mind-control level 2.
U.s. govt. mind-control level 3.
U.s. govt. mind-control level 5
Testing young children to plan the programming.
Chapter 2.science no. 2--the traumatization & torture of the victim
Daily abuse works best for programming
Anger-management-programming traumas
Silence programming traumas to teach silence
Torture for no-write
A trauma to develop animal alters
Trauma to isolate the victim
Chapter 3. science no. 3 the use of drugs
Administration of drugs for programming
More programming drugs (these were not listed in the vol.2 formula book)
Stabilizing the programming
Extensive research done to influence human memory by drugs
The basic phases of memory
Hiding the codes
Programming with lsd-25 (lysergic acid diethylamide)
Chemically triggering natural instinctual drives
Sexual stimulation-programming
Understanding the basics about hypnosis
The power of hypnosis
Understanding the deeper mechanics of hypnosis
Programming aids
Using holograms as an access aid
Preparing the brain
Early training for slaves
Magical training on the starlight level
The monarch programming script for over the rainbow
Deep trance programming
Color programming
The association of colorful sights, sounds, rhythm & dance.
Light & color
Special colors
Healing by correct vibrations & rays
Using hypnosis to heal the slave after abuse.
Hypnotic codes, cues and triggers
Monarch mind-control codes
B. beta (sexual)
C. chi (return to cult)
E. epsilon (animal alters)
I. janus-alex call backs (end-times)
J.>> omicron programming
M. songs & nursery rhymes
O. sample codes for alters.
P. catholic programming (by jesuits etc.)
Q. mensa programming (by mensa)
S. scriptures used in programming (cont. from vol. 2. chap. 10)
T. alien programming
Program codes during 1972-1976 for dr. green
The illuminati.
The establishment, the system.
Deception diminishes power
Be wise as serpents
Disinformation to make their double-agents look good
Names of types of disinformation agents
Tricking suspects
The names of deception tricks
One of the greatest deceptions of all time: disney
Observations about how the illuminati like to hide behind perfect
Contents in the disney deception section of chapter 5.
B. an overview
C. who was walt disney?
Personal details
Occult porn king
As a witness before congress
A possible chronology of events surrounding walt disney's illegitimate birth
Walt disney’s character
D. who was roy o. disney?
E. who was roy b. disney?
The battle between the two disney factions
F. what do we know about the disney family in general?
G. a history of disney
Claude debussy
Some disney people of interest.
Warren beatty
Stephen bollenbach
The tommy dorsey band
Rich h. frank
The osmond brothers
Michael ovitz
Frank g. wells
Some of disney’s blatantly occult movies.
H. disney & its mob connections
Some mob history.
How the disney executives have figured out how to steal land all across the u.s.
Disney and the government
J. disney & mind control
Disney vacations for the elite
Disneyana for the programmed & obsessed.
Mind-control features in disney movies.
K. detailed script on how the disney film fantasia is used for programming
Types of sources
Section e. auxiliary uses of electronics & electromagnetic waves
Glossary of terms for understanding electronic mind control
B1. three typical implant victims
B2. documentation of implants.
B3. gwen towers
Section c. specific implants
Brief chronology of audio implants
Basics of how the implants can function
Uses of the implants
Part. b. secretly implanted audio implants.
Cochlear implants
C2. body manipulating implants
C3. visual/holographic implants
How they work
Typesfiber optics
Artificial lenses
Holographic or h-insert
C4. memex/brain link implants
Interface devices
Organic bioprocessors linked to viruses
C5. torture/nerve & muscle stimulation implants
Section d. direct monitoring & manipulation of the brain/mind
Tesla waves used to read minds & implant voices
D2. voices / or thoughts sent electronically directly into the mind
Summary of elf wave mind control capabilities
Section e. auxiliary uses of electronics & electromagnetic waves.
E2. polygraphs for monitoring programming and mission accomplishments
Liquid crystals
Bed coils standardized for mind-control potential
E4. virtual reality.
Chapter 7: the science of structuring
A. structuring of mpd worlds
Control alters called processors
The ferris-wheel subsystem
Data entry points
Testing alters to see if they can be used.
Assassination models (delta models).
Authority factors are maximized
Monkey alters.
Presidential models.
Prostitute models.
Reporting alters.
Repunzel alter.
Internal wall alters.
Structuring with the grand druid council.
Structuring the shadow alters
Structuring in the mirrors
Structuring the tapestry
Chapter 8: the science of body manipulation & programming
A. cranial manipulation
Cranial blood pressure has been kept a secret
Cerebral spinal fluid kept secret
The chinese secret occult society connection
The ancient egyptian connection
Another example
The japanese connection
The early european occult connection
Nineteenth century occult connection
The witchcraft connection
The modern american occult connection
Osteopathy and chiropractic
Bone & skull structure
Cerebrospinal fluid
Transcendental meditation (tm) & the hindu connection
The 3-in-one school connection.
B. genetic engineering
What we’ve covered
Chapter 9: the science of mind manipulation by psychological
Programming to hide revealing dreams
Programming language
Effects of programming
Perception clouds memory
Chapter 10: the 10th science — using spiritual things to control a
Part a. intro on the importance of spiritual programming tactics
Part b. the history of the programmed golem
Part c. the 3 foundations: loss of identity, fear, and demons
Understanding the relationship between fear & demons
Demon possession & spirit guards
The use of giving demonic assistance to entrap.
The use of occult focal points.
Does it glorify demons to cast them out?
Part d. a complete chronology of how the victim experiences the early spiritual
Part e. specific programming maneuvers. the manipulation of near-death-
Hiding the internal self-helper
Interject disks
White gold, other information
B. internal computers
Installation of the standard programming.
Front programs of front computer.
Programmer access to the computer areas.
C. internal hierarchies
The internal hierarchies form rationales
Chapter 12 science no. 12-external controls
Asset control
Building families and communities that have interwoven programming
Boarding schools & body programming.
When controls fail, the final solution.
Dirty psychiatrists involved with mind control
Dirty tavistock controllers
Remote viewing mind-research
List of programmers (continuation from the list given in vol. 2)
What to look for.
Michael aquino, a military/cult mind-control programmer
Personal history.
Understanding the church of set
Understanding some of aquino’s programming.
Sequelae of abuse
Appendix b. the programming sites
Appendix 3. clones, synthetics, organic robotoids and doubles
Summary of the four methods.
Section a. the "future shock" that this topic subjects the common person to.
Section b. instructions on how to clone a person.
A technique--instructions how to clone a human:
Section c. the four types of ‘clones’ that are used by the illuminati:
C3. organic robotoids.
How the memory of a person is transferred for the organic robotoids.
C4. doubles (look alikes).
Section d. secret cloning sites (see also appendix b, where d.u.m. bases are listed.)
Oregon’s underground secret cloning facility
Further investigations at dulce’s underground cloning facility


Share with your friends:
1   ...   147   148   149   150   151   152   153   154   ...   276


The database is protected by copyright ©userg.info 2017
send message

    Main page

bosch
camera
chevrolet
epson
fiat
Honda
iphone
mitsubishi
nissan
Panasonic
Sony
volvo
yamaha